WO2000074342A1 - Bearer access in wireless communication systems - Google Patents

Bearer access in wireless communication systems Download PDF

Info

Publication number
WO2000074342A1
WO2000074342A1 PCT/IE2000/000070 IE0000070W WO0074342A1 WO 2000074342 A1 WO2000074342 A1 WO 2000074342A1 IE 0000070 W IE0000070 W IE 0000070W WO 0074342 A1 WO0074342 A1 WO 0074342A1
Authority
WO
WIPO (PCT)
Prior art keywords
bearer
interface layer
server
module
interface
Prior art date
Application number
PCT/IE2000/000070
Other languages
French (fr)
Inventor
Owen Sullivan
John Doyle
Original Assignee
Markport Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Markport Limited filed Critical Markport Limited
Priority to DE60023689T priority Critical patent/DE60023689D1/en
Priority to EP00931513A priority patent/EP1181798B1/en
Priority to JP2001500521A priority patent/JP2003501889A/en
Priority to AU49461/00A priority patent/AU4946100A/en
Priority to AT00931513T priority patent/ATE308845T1/en
Publication of WO2000074342A1 publication Critical patent/WO2000074342A1/en
Priority to US09/995,856 priority patent/US20020103940A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/08Upper layer protocols
    • H04W80/12Application layer protocols, e.g. WAP [Wireless Application Protocol]

Definitions

  • the invention relates to access of servers to Wireless Application Protocol (WAP) bearer systems.
  • WAP Wireless Application Protocol
  • the invention is directed towards providing a bearer interface layer to address these problems.
  • an interface layer for a wireless server hosting server applications comprising:
  • a uniform interface to the wireless server a bearer module interface for binding bearer modules to provide access of the server applications to bearer systems, and
  • the functions comprises a configuration manager comprising means for maintaining configuration data relating to bearer modules and for responding to server application calls for a configuration list.
  • the configuration manager comprises means for returning information regarding network type, bearer system type, and address type to server applications.
  • the configuration manager comprises means for capturing bearer module information configured by a bearer developer within constraints of interfacing to the bearer module interface.
  • the configuration manager comprises means for maintaining a configuration file for every bound bearer module.
  • the functions include a bearer manager comprising means for registering bearer modules and for providing bearer module status information to requesting server applications.
  • the bearer manager comprises means for responding to server application calls to register a bearer module. In one embodiment, the bearer manager comprises means for making a bind attempt to bind a bearer module to a transport mechanism.
  • the bearer manager comprises means for responding to application calls to disconnect from a bearer module.
  • the functions include a blacklist and whitelist manager comprising means for automatically testing all non-secure traffic.
  • the blacklist and whitelist manager comprises means for filtering traffic according to parameters set by a server application.
  • the functions include a callback handler comprising means for allowing a server application to call routines for pre-processing and post-processing of WDP packets.
  • the functions include a log function comprising means for logging test data from a bearer module under test, and for providing said data to a requesting server application.
  • the functions include a billing function comprising means for generating billing data on the basis of criteria supplied by a server application.
  • the invention provides a wireless application server comprising WSP and WTP layers over an interface layer as defined above.
  • Fig. 1 is an overview diagram showing the context of an interface layer of the invention
  • Fig. 2 is a diagram showing the structure of the interface layer
  • Figs. 3 and 4 are diagrams illustrating uses of the interface layer.
  • Fig. 5 is a diagram illustrating signal interactions.
  • interface layers 1 allow access by wireless servers 2 to bearer systems 3.
  • the servers 2 include:-
  • a WAP server 5 hosting prototype application and content
  • a WAP proxy 6 performing protocol conversion and content encoding
  • a WTA server 7 hosting telephony based applications.
  • the servers are connected to a Web server 8 via a Firewall 9.
  • the bearer systems are in this embodiment:-
  • each interface layer 1 comprises a server interface 10 to the applications and WTP (Wireless Transaction Protocol) layer of the server.
  • the interface 10 is uniform in its interfacing operations to all of the server applications. It also comprises an interface 11 to bearer system interfacing modules 20, called “bearers” or “bearer modules” in this specification. Between these two interfaces there is:
  • a bearer manager 12 a configuration manager 13 , a log 14, a callback handler 15, a blacklist/ whitelist manager 16, a billing and CDR function 17, and an error function 18.
  • the interface 10 is a uniform interface to all of the server applications and the interface 11 allows bearers 20 to be loaded and offers their services to the applications.
  • one of the bearers 20 is a test bearer which writes to the log 14 and the log 14 returns responses to an application 25 on a WAP stack 26.
  • This is a convenient framework for creation of new bearer modules 20. It also serves to examine and explain the facilities offered by an existing bearer 20. It is thus very suitable for testing bearer modules 20 and allows short development times.
  • a WAP gateway 40 having a WAP stack 41 uses the interface layer 1 to access a data gateway 42 and an SMSC 43.
  • Each of these bearer systems is accessed via a bearer module 20 (Bearer A and Bearer B).
  • the gateway 42 is also accessed by a private interface 44 to be kept secret, while the SMSC is accessed via SMPP 45 (which is public).
  • SMPP 45 which is public.
  • the layer 1 allows versatility in the manner in which bearer developers may link their bearer system with a server: a private or a public protocol may be used.
  • All of the bearer modules 20 are bound by the rules of the interface 11, but may or may not be private on the bearer system side. This is illustrated in Fig. 4 in which there is a secret interface 46 and an SMPP interface 47 on the bearer system side. The following describes the functions between the interfaces 10 and 1 1 in more detail.
  • the manager 13 maintains a file which specifies which bearer modules are present, and there is a configuration file of bearer module parameters for each bearer module.
  • Each bearer module consists of one or more bearer files and bearer configuration files. Where possible, bearer modules are designed for dynamic loading but where this is not possible or not desirable static linking of bearer modules is supported.
  • the bearer manager 12 is responsible for the loading and management of the bearer modules. It performs version checking and license checking
  • the contents of the lists are URLs or originator addresses.
  • Fig. 5 Some of the above calls are illustrated in Fig. 5, in which server applications communicate with an SMSC bearer system for bi-directional transfer of WAP content. The following describes the calls in more detail, with examples of code.
  • w c_bearer_list Returns the list of bearer modules configured by the system. The call actually returns the value of the bearer list parameter from the wdc-dtk.ini (layer 1 configuration file). Each item in the bearer list is known as a bearer tag and can be used to retrieve information on that bearer using the "wdc_info" call.
  • the information returned includes the information from the "Network Bearer table" defined by WAP.
  • a connection is not required to obtain information about the bearer.
  • a handler for each of the above calls is provided. How the call is implemented is decided by the developer of each bearer module within the constraints imposed by the interface 11. For example a developer can chose to implement the "wdc_parm" handler to read from a flat file, to read from a database or to permanently return a blank value.
  • This function is used by the application to connect to a bearer. It makes an application layer connection to the bearer.
  • the bearer module should, on a 'bind', attempt to connect/bind to the transport mechanism to ensure it is in place. If an application wants to connect to multiple bearer systems, say USSD and SMS, then it must make multiple bind calls:
  • This function returns a non-NULL connection identified which will be used by all further call to this bearer until the connection is terminated.
  • the function returns null and stores an error in the global error number variable.
  • wdc close This tells the bearer module that the server application is disconnecting. All resources allocated to using the bearer should be freed.
  • one of the areas the layer 1 simplifies is the complex area of interfacing to telecom billing and prepaid systems. It is possible for an application to instruct the layer 1 to load and enable a billing sub module. The application may chose to enable the layer 1 to automatically log location URL and/or Volume of data as CRD for billing. This is only possible for WAP if the non- secure port is used.
  • the INI setting "billing_module" points to the location of the billing module to load.
  • the application may call the layer 1 to create CDRs.
  • the INI parameter is the INI parameter
  • Black_while_list indicates the file to use.
  • This call is used to get a value of a configuration parameter from one of the configuration files.
  • the wdcjmodule parameter selects which of the module - MAIN or one of the bearers is queried. Having a separate configuration file for each bearer module is necessary to prevent naming conflicts when bearer modules are provided by third parties.
  • Callbacks are provided by the layer 1 to allow an application request that it handles various events:
  • ERROR - allows the application register its own handler for error conditions this is useful it the application already has an error logging facility that it wishes to use.
  • LOG - allow an application to register its own handler for logging messages.
  • the interface layer 1 also allows the addition of new bearers as they become available, and the application to utilise 'intelligent' selection of bearers.

Abstract

An interface layer (1) resides on a wireless server hosting server applications. The layer (1) allows bearer modules (20) to be bound to the server and the modules (20) may have a private or a public interface on the bearer system side. The layer (1) has bearer manager (12), configuration manager (13), log (14), callback handler (15), blacklist and whitelist manager (16), billing (17) and error (18) functions.

Description

"Bearer Access in Wireless Commumcation Systems
INTRODUCTION
Field of the Invention
The invention relates to access of servers to Wireless Application Protocol (WAP) bearer systems.
At present, it is known to provide an interface, and a development environment for such an interface, which allows access to Short Message Service Centres (SMSCs) via the (Short Message Peer-to-Peer) SMPP protocol. These products are very effective for the particular interfacing involved. However, many developers for environments such as Web server applications are unfamiliar with wireless interfacing functionality. Also, those developers vv'ho are expert in this area often prefer to maintain the bearer-side interfacing functionality private and avoid the problems associated with providing backwards and forwards compatibility and ensuring correct use. Such bearer developers also have the problem of testing their interfaces on multiple server platforms.
The invention is directed towards providing a bearer interface layer to address these problems.
SUMMARY OF THE INVENTION
According to the invention, there is provided an interface layer for a wireless server hosting server applications, the interface layer comprising:
a uniform interface to the wireless server, a bearer module interface for binding bearer modules to provide access of the server applications to bearer systems, and
functions between said layers to allow server applications to make calls to connect to a bearer module and to determine status of accessible bearer systems.
In one embodiment, the functions comprises a configuration manager comprising means for maintaining configuration data relating to bearer modules and for responding to server application calls for a configuration list.
In one embodiment, the configuration manager comprises means for returning information regarding network type, bearer system type, and address type to server applications.
In one embodiment, the configuration manager comprises means for capturing bearer module information configured by a bearer developer within constraints of interfacing to the bearer module interface.
In one embodiment, the configuration manager comprises means for maintaining a configuration file for every bound bearer module.
In one embodiment, the functions include a bearer manager comprising means for registering bearer modules and for providing bearer module status information to requesting server applications.
In one embodiment, the bearer manager comprises means for responding to server application calls to register a bearer module. In one embodiment, the bearer manager comprises means for making a bind attempt to bind a bearer module to a transport mechanism.
In one embodiment, the bearer manager comprises means for responding to application calls to disconnect from a bearer module.
In one embodiment, the functions include a blacklist and whitelist manager comprising means for automatically testing all non-secure traffic.
In one embodiment, the blacklist and whitelist manager comprises means for filtering traffic according to parameters set by a server application.
In one embodiment, the functions include a callback handler comprising means for allowing a server application to call routines for pre-processing and post-processing of WDP packets.
In one embodiment, the functions include a log function comprising means for logging test data from a bearer module under test, and for providing said data to a requesting server application.
In one embodiment, the functions include a billing function comprising means for generating billing data on the basis of criteria supplied by a server application.
According to another aspect, the invention provides a wireless application server comprising WSP and WTP layers over an interface layer as defined above.
DETAILED DESCRIPTION OF THE INVENTION
Brief Description of the Drawings The invention will be more clearly understood from the following description of some embodiments thereof, given by way of example only with reference to the accompanying drawings in which:
Fig. 1 is an overview diagram showing the context of an interface layer of the invention;
Fig. 2 is a diagram showing the structure of the interface layer; and
Figs. 3 and 4 are diagrams illustrating uses of the interface layer; and
Fig. 5 is a diagram illustrating signal interactions.
Description of the Embodiments
Referring to Fig. 1, interface layers 1 allow access by wireless servers 2 to bearer systems 3. In the embodiment illustrated, the servers 2 include:-
a WAP server 5 hosting prototype application and content, - a WAP proxy 6 performing protocol conversion and content encoding, and a WTA server 7 hosting telephony based applications.
The servers are connected to a Web server 8 via a Firewall 9. The bearer systems are in this embodiment:-
a Circuit Switched Data bearer system 10, an Express Messaging SMSC bearer system 11 , an SMSC bearer system 12, and - a USSD gateway bearer system 13. Referring to Fig. 2 each interface layer 1 comprises a server interface 10 to the applications and WTP (Wireless Transaction Protocol) layer of the server. The interface 10 is uniform in its interfacing operations to all of the server applications. It also comprises an interface 11 to bearer system interfacing modules 20, called "bearers" or "bearer modules" in this specification. Between these two interfaces there is:
a bearer manager 12, a configuration manager 13 , a log 14, a callback handler 15, a blacklist/ whitelist manager 16, a billing and CDR function 17, and an error function 18.
The interface 10 is a uniform interface to all of the server applications and the interface 11 allows bearers 20 to be loaded and offers their services to the applications.
Referring to Fig. 3, one of the bearers 20 is a test bearer which writes to the log 14 and the log 14 returns responses to an application 25 on a WAP stack 26. This is a convenient framework for creation of new bearer modules 20. It also serves to examine and explain the facilities offered by an existing bearer 20. It is thus very suitable for testing bearer modules 20 and allows short development times.
Referring to Fig. 4, a WAP gateway 40 having a WAP stack 41 uses the interface layer 1 to access a data gateway 42 and an SMSC 43. Each of these bearer systems is accessed via a bearer module 20 (Bearer A and Bearer B). However the gateway 42 is also accessed by a private interface 44 to be kept secret, while the SMSC is accessed via SMPP 45 (which is public). It will thus be appreciated that the layer 1 allows versatility in the manner in which bearer developers may link their bearer system with a server: a private or a public protocol may be used. All of the bearer modules 20 are bound by the rules of the interface 11, but may or may not be private on the bearer system side. This is illustrated in Fig. 4 in which there is a secret interface 46 and an SMPP interface 47 on the bearer system side. The following describes the functions between the interfaces 10 and 1 1 in more detail.
Configuration manager 13 The manager 13 maintains a file which specifies which bearer modules are present, and there is a configuration file of bearer module parameters for each bearer module.
Bearer modules 20
Each bearer module consists of one or more bearer files and bearer configuration files. Where possible, bearer modules are designed for dynamic loading but where this is not possible or not desirable static linking of bearer modules is supported.
Bearer manager 12
The bearer manager 12 is responsible for the loading and management of the bearer modules. It performs version checking and license checking
Billing & CDRs 17
This can be set to be in automatic operation to generate billing information (and prepaid queries) for all non secure traffic or it can be invoked by the server application for all types of traffic. Billing is on a basis set by the server application, such as per- URL or per data volume. White & Blacklist Manager 16
This can be set to be in 'automatic operation' and automatically test all non-secure traffic, or can be invoked by a server application for required types of traffic. The contents of the lists are URLs or originator addresses.
Callback Handler 15
This allows the server application to request the layer 1 call its routines to provide extended pre and post processing of WDP packets.
The calls available to the server applications are set out in the table below.
Figure imgf000009_0001
The following handlers are provided to the bearer developer
Figure imgf000010_0001
Some of the above calls are illustrated in Fig. 5, in which server applications communicate with an SMSC bearer system for bi-directional transfer of WAP content. The following describes the calls in more detail, with examples of code.
w c_bearer_list Returns the list of bearer modules configured by the system. The call actually returns the value of the bearer list parameter from the wdc-dtk.ini (layer 1 configuration file). Each item in the bearer list is known as a bearer tag and can be used to retrieve information on that bearer using the "wdc_info" call.
wdc-dtk.ini [main]
Bearer JJst = SMSC01, SMSC_DG, USSD, CSD23, EXP-001
Each of the items in the list will have their own section in the ".ini" file.
[SMSC01] bearer_modue = "smsc01/smsc3-4" parameter_fιle = "smscOl/smsc.ini" network = "GSM" bearer_type = "SMS" address_type = "GSM_MSISDN" assigned_number = "0x03"
wdcjinfo
Returns an INFO element for a connection. The information returned includes the information from the "Network Bearer table" defined by WAP.
- Network
- Bearer type
- Address Type
- Assigned Number
A connection is not required to obtain information about the bearer.
When a new bearer module 20 is being created a handler for each of the above calls is provided. How the call is implemented is decided by the developer of each bearer module within the constraints imposed by the interface 11. For example a developer can chose to implement the "wdc_parm" handler to read from a flat file, to read from a database or to permanently return a blank value.
wdc_register
This is called by the application to load/register a specific bearer module. One of the parameters passed in the version identifier of the interface to ensure that only modules of a correct or later version are loaded, [f the layer 1 locates an older version of the bearer module then that which it expects an error is returned.
wdc connect
This function is used by the application to connect to a bearer. It makes an application layer connection to the bearer. The bearer module should, on a 'bind', attempt to connect/bind to the transport mechanism to ensure it is in place. If an application wants to connect to multiple bearer systems, say USSD and SMS, then it must make multiple bind calls:
socket = wdc_connect(bearer); e.g. socketSMS = wdc_connect(GSM_SMS);
Returns
Success: This function returns a non-NULL connection identified which will be used by all further call to this bearer until the connection is terminated.
Failure: The function returns null and stores an error in the global error number variable.
wdc close This tells the bearer module that the server application is disconnecting. All resources allocated to using the bearer should be freed.
wdc_close(socketSMS);
wdc_send
Is used to send information to a data gateway via a bearer module using the layer 1.
dc_get
Is used to read information from a data gateway via a bearer module using the layer 1.
wdcjog
wdc_log(socket, severity, msg);
An example is: wdc_log(socketSMS, WARNING, "Less the 10 % Memory remaining.");
Regarding billing and prepaid queries, one of the areas the layer 1 simplifies is the complex area of interfacing to telecom billing and prepaid systems. It is possible for an application to instruct the layer 1 to load and enable a billing sub module. The application may chose to enable the layer 1 to automatically log location URL and/or Volume of data as CRD for billing. This is only possible for WAP if the non- secure port is used.
Wdc_cdr_mode(setting)
- VOLUME
- URL - OFF The INI setting "billing_module" points to the location of the billing module to load.
The application may call the layer 1 to create CDRs.
wdc_cdr_volume(CDR_HEADER, 400); Log 400 bytes
wdc_cdr_url(CDR_HEADER, "http://www.wapforum.com/index.wml");
Other calls include Whitelist and Blacklist management, in which an application may enable automatic Black/White list checking. The application may call the layer 1 to check a URL against the Black/While list using :
wdc_check_mode(ON/OFF);
wdc_check_url(check_interface , url) ;
The INI parameter:
"Black_while_list" indicates the file to use.
wdc parm
This is used by applications for parameter reading: err_code_t wdc_parm(bearer_tag, wdc_param_t, *parameter);
typedef struct t char name[WDC_PARAM_NAME_SIZE]; char value[WDC_PARAM_VALUE_SIZE]; } wdc_pararm_t;
This call is used to get a value of a configuration parameter from one of the configuration files. The wdcjmodule parameter selects which of the module - MAIN or one of the bearers is queried. Having a separate configuration file for each bearer module is necessary to prevent naming conflicts when bearer modules are provided by third parties.
RETURNS Success: The function returns and ERR_OK and the value of the parameter is placed in the value field of the structure.
Failure: The function returns a non-zero error number.
Callbacks are provided by the layer 1 to allow an application request that it handles various events:
wdc_callback(item, handler)
ERROR - allows the application register its own handler for error conditions this is useful it the application already has an error logging facility that it wishes to use.
LOG - allow an application to register its own handler for logging messages.
It will be appreciated that the invention provides for excellent versatility for both bearer-side and server-side development. The interface layer 1 also allows the addition of new bearers as they become available, and the application to utilise 'intelligent' selection of bearers.
The invention is not limited to the embodiments described, but may be varied in construction and detail.

Claims

Claims
1. An interface layer for a wireless server hosting server applications, the interface layer comprising:
a uniform interface (10) to the wireless server,
a bearer module interface(ll) for binding bearer modules (20) to provide access of the server applications to bearer systems, and
functions between said layers to allow server applications to make calls to connect to a bearer module and to determine status of accessible bearer systems.
2. An interface layer as claimed in claim 1, wherein the functions comprises a configuration manager comprising mean for maintaining a configuration file of bearer modules and for responding to server application calls for a configuration list.
3. An interface layer as claimed in claim 2, wherein the configuration manager comprises means for returning information regarding network type, bearer system type, and address type to server applications.
4. An interface layer as claimed in claim 3, wherein the configuration manager comprises means for capturing bearer module information configured by a bearer developer within constraints of interfacing to the bearer module interface.
5. An interface layer as claimed in claims 2 to 4, wherein the configuration manager comprises means for maintaining a configuration file for every bound bearer module.
6. An interface layer as claimed in any preceding claim wherein the functions include a bearer manager comprising means for registering bearer modules and for indicating bearer module status.
7. An interface layer as claimed in claim 6. wherein the bearer manager comprises means for responding to server application calls to register a bearer module.
8. An interface layer as claimed in claim 7, wherein the bearer manager comprises means for making a bind attempt to bind a bearer module to a transport mechanism.
9. An interface layer as claimed in claims 6, 7, or 8 wherein the bearer manager comprises means for responding to application calls to disconnect from a bearer module.
10. An interface layer as claimed in any preceding claim, wherein the functions include a blacklist and whitelist manager comprising means for automatically testing all non-secure traffic.
11. An interface layer as claimed in claim 10, wherein the blacklist and whitelist manager comprises means for filtering traffic according to parameters set by a server application.
12. An interface layer as claimed in any preceding claim wherein the functions include a callback handler comprising means for allowing a server application to call routines for pre-processing and post-processing of WDP packets.
13. An interface layer as claimed in any preceding claim, wherein the functions include a log function comprising means for logging test data from a bearer module under test, and for providing said data to a requesting server application.
14. An interface layer as claimed in any preceding claim, wherein the functions include a billing function comprising means for generating billing data on the basis of criteria supplied by a server application.
15. A wireless application server comprising a WSP and WTP layers over an interface layer as claimed in any preceding claim.
PCT/IE2000/000070 1999-06-01 2000-06-01 Bearer access in wireless communication systems WO2000074342A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
DE60023689T DE60023689D1 (en) 1999-06-01 2000-06-01 TRANSMISSION ROUTE ACCESS IN WIRELESS TELECOMMUNICATIONS SYSTEMS
EP00931513A EP1181798B1 (en) 1999-06-01 2000-06-01 Bearer access in wireless communication systems
JP2001500521A JP2003501889A (en) 1999-06-01 2000-06-01 Bearer access in wireless communication systems
AU49461/00A AU4946100A (en) 1999-06-01 2000-06-01 Bearer access in wireless communication systems
AT00931513T ATE308845T1 (en) 1999-06-01 2000-06-01 TRANSMISSION PATH ACCESS IN WIRELESS TELECOMMUNICATIONS SYSTEMS
US09/995,856 US20020103940A1 (en) 1999-06-01 2001-11-29 Bearer access in wireless communication systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IE990451 1999-06-01
IE990451 1999-06-01

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/995,856 Continuation US20020103940A1 (en) 1999-06-01 2001-11-29 Bearer access in wireless communication systems

Publications (1)

Publication Number Publication Date
WO2000074342A1 true WO2000074342A1 (en) 2000-12-07

Family

ID=11042077

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IE2000/000070 WO2000074342A1 (en) 1999-06-01 2000-06-01 Bearer access in wireless communication systems

Country Status (8)

Country Link
US (1) US20020103940A1 (en)
EP (1) EP1181798B1 (en)
JP (1) JP2003501889A (en)
AT (1) ATE308845T1 (en)
AU (1) AU4946100A (en)
DE (1) DE60023689D1 (en)
IE (2) IE20000442A1 (en)
WO (1) WO2000074342A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7787862B2 (en) 2002-07-29 2010-08-31 T-Mobile Deutschland Gmbh Method for video monitoring objects by means of a mobile communications systems

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7062555B1 (en) 2001-04-06 2006-06-13 Networks Associates Technology, Inc. System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment
US7181506B1 (en) * 2001-04-06 2007-02-20 Mcafee, Inc. System and method to securely confirm performance of task by a peer in a peer-to-peer network environment
DE10301904B4 (en) * 2003-01-17 2005-06-30 T-Mobile Deutschland Gmbh Method for testing SMS connections in mobile communication systems
CN103905510B (en) * 2012-12-28 2018-04-27 深圳市腾讯计算机系统有限公司 The processing method and background server of a kind of data packet

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999014877A1 (en) * 1997-09-12 1999-03-25 Motorola Inc. Protocol stack architecture in wireless data device and method of communicating

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6091712A (en) * 1994-12-23 2000-07-18 Applied Digital Access, Inc. Method and apparatus for storing and retrieving performance data collected by a network interface unit
US6292833B1 (en) * 1998-07-17 2001-09-18 Openwave Systems Inc. Method and apparatus for providing access control to local services of mobile devices
US7010603B2 (en) * 1998-08-17 2006-03-07 Openwave Systems Inc. Method and apparatus for controlling network connections based on destination locations

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999014877A1 (en) * 1997-09-12 1999-03-25 Motorola Inc. Protocol stack architecture in wireless data device and method of communicating

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MARTINI G ET AL: "DISTRIBUTED ARCHITECTURE FOR APPLICATIONS BASED ON THE GSM SHORT MESSAGE SERVICE", INTERNATIONAL WORKSHOP ON SERVICES IN DISTRIBUTED AND NETWORKED ENVIRONMENTS,XX,XX, 5 June 1995 (1995-06-05), pages 140 - 145, XP000612264 *
TURO HEIKKINEN: "Wireless Application Protocol", MULTIMEDIASEMINAARI, 8 April 1999 (1999-04-08) - 8 April 1999 (1999-04-08), pages 1 - 7, XP002148057 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7787862B2 (en) 2002-07-29 2010-08-31 T-Mobile Deutschland Gmbh Method for video monitoring objects by means of a mobile communications systems

Also Published As

Publication number Publication date
JP2003501889A (en) 2003-01-14
ATE308845T1 (en) 2005-11-15
IE20000442A1 (en) 2001-02-21
EP1181798A1 (en) 2002-02-27
AU4946100A (en) 2000-12-18
DE60023689D1 (en) 2005-12-08
EP1181798B1 (en) 2005-11-02
US20020103940A1 (en) 2002-08-01
IES20000437A2 (en) 2001-02-21

Similar Documents

Publication Publication Date Title
US6490291B1 (en) Device for data communications between wireless application protocol terminal and wireless application server, and method thereof
EP2397950B1 (en) A web services push gateway and method
US7596623B2 (en) Configurable connector
US7502851B1 (en) Facility to transmit network management data to an umbrella management system
US7228333B1 (en) Wireless internet gateway
US20010047383A1 (en) System and method for on-demand communications with legacy networked devices
JP2005518693A (en) Call processing in mobile communication networks.
CN113746928B (en) Cross-cloud service calling method, device and system
US6757734B1 (en) Method of communication
FI114581B (en) software development environment
EP1181798B1 (en) Bearer access in wireless communication systems
Patel et al. A technique for multi-network access to multimedia messages
WO2002015598A1 (en) System and method for the provision of services over different networks
US7260618B2 (en) Method in an embedded environment for arranging functionality of a remote device
WO2003044615A2 (en) Network services broker system and method
Ruggaber et al. Using WAP as the enabling technology for CORBA in mobile and wireless environments
Roth A Communication Middleware for Mobile and Ad-hoc Senarios.
Ruggaber et al. A transparent network handover for nomadic CORBA users
MXPA06006342A (en) Port type agnostic proxy support for web services intermediaries.
Silfvast A Web Services Interface for Managing Mobile Messaging Services
CN117768924A (en) Network disaster recovery method, device, client and service control point
Uskela Services in cellular packet data networks
CN116233118A (en) Service file transmission method, device, equipment and computer readable storage medium
WO2004043034A1 (en) Method and arrangement for installing an application in wireless environment
Masenya Open Standard Query Interface for Geospatial Databases in OSA/Parlay

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2000931513

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09995856

Country of ref document: US

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2001 500521

Kind code of ref document: A

Format of ref document f/p: F

WWP Wipo information: published in national office

Ref document number: 2000931513

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWG Wipo information: grant in national office

Ref document number: 2000931513

Country of ref document: EP